Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 1 of 1
Full-Text Articles in Computer Sciences
Analyzing And Quantifying The Impact Of Software Diversification On Return-Oriented Programming (Rop) Based Exploits, David Reyes
Analyzing And Quantifying The Impact Of Software Diversification On Return-Oriented Programming (Rop) Based Exploits, David Reyes
Open Access Theses & Dissertations
With the implementation of modern software mitigation techniques such: as Address Space Layout Randomization (ASLR), stack canaries, and the No-Execute bit (N.X.), attackers can no longer achieve arbitrary code execution simply by injecting shellcode into a vulnerable buffer and redirecting execution to this vulnerable buffer. Instead, attackers have pivoted to Return Oriented Programming (ROP) to achieve the same arbitrary code execution. Using this attack method, attackers string together ROP gadgets, assembly code snippets found in the target binary, to form what are known as ROP Chains. Using these ROP Chains, attackers can achieve the same malicious behavior as previous code …